Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_05057d34\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0789c3c3\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0fa97499\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0fb9b83a\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_14062c50\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_1431a86b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17918727\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17c5cdc5\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17e1912a\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_83ec7e94952b3dcbb61bd30e98682b9f65d64_440dec59_0e4aaad7\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\soft[1]
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\dll[1]
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Bunifu_UI_v1.5.3.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER276E.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:30:19 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A00.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2ACC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70B1.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:32 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER72A6.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7334.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER790E.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:35 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B03.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7BA0.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8245.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:37 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER84A8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8545.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C48.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:40 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8E7B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F09.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER957F.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:43 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9D7F.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA4CC.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:30:52 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA550.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA77D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA849.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB28D.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:50 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB608.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6A5.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBE54.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:53 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC1DF.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC26D.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC980.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:55 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC01.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC9E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\library[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\fuckingdllENCR[1].dll
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\ping[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\ping[1].htm
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\library[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\ping[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\Desktop\Cleaner.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon
number=0, Archive, ctime=Mon Oct 3 23:30:18 2022, mtime=Mon Oct 3 23:30:18 2022, atime=Mon Oct 3 23:30:18 2022, length=3947920,
window=hide
|
dropped
|
There are 42 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
C:\Users\user\Desktop\file.exe
|
||
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
|
"C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 528
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 700
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 724
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 760
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 768
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 848
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 840
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1032
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1292
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1552
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /im "file.exe" /f & erase "C:\Users\user\Desktop\file.exe" & exit
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /im "file.exe" /f
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&substream=mixinte
|
208.67.104.97
|
||
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=mixtwo&substream=mixinte
|
208.67.104.97
|
||
http://85.31.46.167/software.php
|
85.31.46.167
|
||
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&subst
|
unknown
|
||
http://171.22.30.106/library.php
|
171.22.30.106
|
||
http://www.jiyu-kobo.co.jp/ho
|
unknown
|
||
http://www.sajatypeworks.com-
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.sajatypeworks.como2
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.founder.com.cn/cn/cn
|
unknown
|
||
http://www.jiyu-kobo.co.jp/jp/ho
|
unknown
|
||
https://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://www.jiyu-kobo.co.jp/Y0ho
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://fontfabrik.com
|
unknown
|
||
http://www.jiyu-kobo.co.jp/.T
|
unknown
|
||
http://www.zhongyicts.com.cn.TTF
|
unknown
|
||
http://www.fontbureau.com(
|
unknown
|
||
http://www.typography.net
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.sajatypeworks.comtr
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.urwpp.de
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://107.182.129.235/storage/ping.php
|
107.182.129.235
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.fontbureau.com/designersp
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
http://www.fontbureau.com/designerso
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.jiyu-kobo.co.jp/.TTC
|
unknown
|
||
http://www.fontbureau.comH_
|
unknown
|
||
http://www.sakkal.comI
|
unknown
|
||
http://www.tiro.comq
|
unknown
|
||
http://107.182.129.235/storage/extension.php
|
107.182.129.235
|
||
http://www.jiyu-kobo.co.jp/F
|
unknown
|
||
http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
|
unknown
|
||
https://iplogger.org
|
unknown
|
||
http://www.sajatypeworks.comd:
|
unknown
|
||
https://iplogger.orgx
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.founder.com.cn/cn/
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://iplogger.org
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-jones.html
|
unknown
|
||
http://www.typography.netad
|
unknown
|
||
https://g-cleanit.hk
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.sajatypeworks.comcom
|
unknown
|
||
https://iplogger.org/1Pz8p7
|
148.251.234.83
|
||
http://www.fontbureau.com/designers/
|
unknown
|
||
http://www.monotype.9
|
unknown
|
There are 56 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
iplogger.org
|
148.251.234.83
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.67.104.97
|
unknown
|
United States
|
||
85.31.46.167
|
unknown
|
Germany
|
||
148.251.234.83
|
iplogger.org
|
Germany
|
||
107.182.129.235
|
unknown
|
Reserved
|
||
171.22.30.106
|
unknown
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
ProgramId
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
FileId
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
LowerCaseLongPath
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
LongPathHash
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
Name
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
Publisher
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
Version
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
BinFileVersion
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
BinaryType
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
ProductName
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
ProductVersion
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
LinkDate
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
BinProductVersion
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
Size
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
Language
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
IsPeFile
|
||
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\Software\GCleaner\Trial
|
Count
|
||
HKEY_CURRENT_USER\Software\GCleaner\License
|
License
|
||
HKEY_CURRENT_USER\Software\GCleaner\Install
|
Postcheck
|
There are 27 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21C0000
|
direct allocation
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
2200000
|
direct allocation
|
page read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
21C0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
A1B06FE000
|
stack
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE3711000
|
trusted library allocation
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE1C30000
|
trusted library allocation
|
page read and write
|
||
7FF9A5950000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
1160000
|
unkown
|
page read and write
|
||
1CFE1B38000
|
heap
|
page read and write
|
||
103D000
|
stack
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
B1A000
|
heap
|
page read and write
|
||
1CFE554A000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
3928000
|
trusted library allocation
|
page read and write
|
||
1CFD91D1000
|
trusted library allocation
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1AA0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
1CFE2020000
|
trusted library allocation
|
page read and write
|
||
7FF9A57B2000
|
trusted library allocation
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
1CFE1B4C000
|
heap
|
page read and write
|
||
3952000
|
heap
|
page read and write
|
||
1CFE1B33000
|
heap
|
page read and write
|
||
1CFE1B29000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC77C0000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
1CFE1CED000
|
trusted library allocation
|
page read and write
|
||
1CFC7870000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE64DE000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE5C3C000
|
heap
|
page read and write
|
||
1CFE36BC000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC7831000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2B000
|
heap
|
page read and write
|
||
1CFE36C7000
|
trusted library allocation
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
3716000
|
trusted library allocation
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B3A000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B29000
|
heap
|
page read and write
|
||
1CFC7850000
|
trusted library allocation
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
3274000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B00000
|
heap
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1932000
|
unkown
|
page readonly
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
230D000
|
stack
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE33C0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B42000
|
heap
|
page read and write
|
||
A1B08FE000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1A49000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
19B000
|
stack
|
page read and write
|
||
1CFE36D5000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE2120000
|
trusted library allocation
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
25AA0849000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE1B50000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
A1B09FE000
|
stack
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFC7832000
|
trusted library allocation
|
page read and write
|
||
25AA0D13000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
7FF9A5970000
|
trusted library allocation
|
page execute and read and write
|
||
6CE000
|
stack
|
page read and write
|
||
1CFC7754000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
386E000
|
trusted library allocation
|
page read and write
|
||
23FD000
|
stack
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1CFE1B22000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE20B0000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE6463000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE1CD6000
|
trusted library allocation
|
page read and write
|
||
1CFE1B25000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B21000
|
heap
|
page read and write
|
||
1CFE6404000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE5F83000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
1CFE1B50000
|
heap
|
page read and write
|
||
E628B2D000
|
stack
|
page read and write
|
||
1CFE1B23000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFC72F0000
|
unkown
|
page readonly
|
||
1CFC7831000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1CA0000
|
trusted library allocation
|
page read and write
|
||
1CFE1E10000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
7FF9A58C2000
|
trusted library allocation
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
E628EF9000
|
stack
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B22000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1CFC91A0000
|
remote allocation
|
page read and write
|
||
1CFC7834000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1CFE676F000
|
trusted library allocation
|
page read and write
|
||
1CFE36F9000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1DC0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
94E000
|
unkown
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFC7810000
|
trusted library allocation
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE19DD000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
1CFE1AB0000
|
trusted library allocation
|
page read and write
|
||
1CFC7831000
|
trusted library allocation
|
page read and write
|
||
1CFE1C80000
|
trusted library allocation
|
page read and write
|
||
1CFE1D10000
|
trusted library allocation
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
25AA0700000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B2D000
|
heap
|
page read and write
|
||
3717000
|
trusted library allocation
|
page read and write
|
||
25AA0D13000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page readonly
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
410000
|
unkown
|
page write copy
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1A8D000
|
trusted library allocation
|
page read and write
|
||
1CFE1D90000
|
trusted library allocation
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B20000
|
heap
|
page read and write
|
||
A1B07FD000
|
stack
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE36DC000
|
trusted library allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1CFE1D00000
|
trusted library allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
3B36000
|
trusted library allocation
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
1CFE5980000
|
trusted library allocation
|
page read and write
|
||
25AA0839000
|
heap
|
page read and write
|
||
1CFE1F90000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
23C0000
|
remote allocation
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
371A000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1EC0000
|
trusted library allocation
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1CFE1A65000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
3D75000
|
trusted library allocation
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1B32000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
1CFE1FC0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
E62907F000
|
stack
|
page read and write
|
||
1CFC7850000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
1CFE2D13000
|
heap
|
page read and write
|
||
1CFE1B50000
|
heap
|
page read and write
|
||
1CFC7833000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFC7810000
|
trusted library allocation
|
page read and write
|
||
1CFE1B52000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1CFC7750000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFC77E0000
|
trusted library allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
25AA0828000
|
heap
|
page read and write
|
||
37C3000
|
trusted library allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
31C8000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE20A0000
|
trusted library allocation
|
page read and write
|
||
1CFC9180000
|
trusted library allocation
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
1CFE1930000
|
unkown
|
page readonly
|
||
1CFE64BD000
|
heap
|
page read and write
|
||
386E000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE2110000
|
trusted library allocation
|
page read and write
|
||
1CFE1B15000
|
heap
|
page read and write
|
||
1CFE1F50000
|
trusted library allocation
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1CFE1B38000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFC7843000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE646D000
|
heap
|
page read and write
|
||
1CFE1B52000
|
heap
|
page read and write
|
||
390B000
|
trusted library allocation
|
page read and write
|
||
1CFE1B23000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1D50000
|
trusted library allocation
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFC7832000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1E50000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B70000
|
trusted library allocation
|
page read and write
|
||
1CFC91A0000
|
remote allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B22000
|
heap
|
page read and write
|
||
1CFE1F00000
|
trusted library allocation
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
1CFE1B32000
|
heap
|
page read and write
|
||
1CFE3700000
|
trusted library allocation
|
page read and write
|
||
1CFE6460000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
25AA0802000
|
unkown
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
1CFE36E7000
|
trusted library allocation
|
page read and write
|
||
1CFE1AF0000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B24000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFC75B0000
|
heap
|
page read and write
|
||
1CFE1AC5000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE6457000
|
heap
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
1CFC7837000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
7FF9A57C0000
|
trusted library allocation
|
page read and write
|
||
1CFE1DB0000
|
trusted library allocation
|
page read and write
|
||
25AA0D02000
|
heap
|
page read and write
|
||
1CFE1B53000
|
heap
|
page read and write
|
||
234F000
|
stack
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
3718000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFC7790000
|
heap
|
page execute and read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B69000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
1CFE6406000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
25AA0D13000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B30000
|
trusted library allocation
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
25AA0D02000
|
heap
|
page read and write
|
||
1CFE64ED000
|
heap
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
2FF0000
|
remote allocation
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC91B0000
|
heap
|
page read and write
|
||
1CFE1FB0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1E00000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE6483000
|
heap
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
1CFC77E0000
|
trusted library allocation
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
1CFE2D62000
|
heap
|
page read and write
|
||
1CFE1B2D000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFC95D8000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
7FF9A57A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
23BD000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
2DAD000
|
stack
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1CFE1B42000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
25AA0923000
|
heap
|
page read and write
|
||
1CFE1B32000
|
heap
|
page read and write
|
||
1CFE1B38000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFE213C000
|
trusted library allocation
|
page read and write
|
||
1CFE647A000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
1CFE36EE000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE66A2000
|
trusted library allocation
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
3801000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
3B38000
|
trusted library allocation
|
page read and write
|
||
1CFE5C5F000
|
heap
|
page read and write
|
||
3882000
|
trusted library allocation
|
page read and write
|
||
1CFE1A4C000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
1CFE1B53000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE2C97000
|
heap
|
page read and write
|
||
1CFC7800000
|
trusted library allocation
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
23BD000
|
stack
|
page read and write
|
||
371D000
|
trusted library allocation
|
page read and write
|
||
1CFE5C61000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
23FD000
|
stack
|
page read and write
|
||
1CFC7800000
|
trusted library allocation
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1CFE6673000
|
trusted library allocation
|
page read and write
|
||
1CFE1F40000
|
trusted library allocation
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
1CFE6448000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page readonly
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
1CFE6573000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B3B000
|
heap
|
page read and write
|
||
1CFE36B8000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1C70000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
230D000
|
stack
|
page read and write
|
||
1CFC9172000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
38EF000
|
trusted library allocation
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFE1B42000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
1CFE1A90000
|
trusted library allocation
|
page read and write
|
||
1CFE33E0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE6548000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFC7627000
|
heap
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
7FF9A57CB000
|
trusted library allocation
|
page execute and read and write
|
||
1CFE1B40000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE1AC0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2C000
|
heap
|
page read and write
|
||
1CFC7831000
|
trusted library allocation
|
page read and write
|
||
3311000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
1CFE36C3000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
371C000
|
trusted library allocation
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
1CFE1DA0000
|
trusted library allocation
|
page read and write
|
||
1CFE198A000
|
heap
|
page read and write
|
||
1CFE68E0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1CFE1C60000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1C20000
|
trusted library allocation
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2C000
|
heap
|
page read and write
|
||
1CFE2D74000
|
heap
|
page read and write
|
||
1CFC74C0000
|
heap
|
page read and write
|
||
1CFE1FA0000
|
trusted library allocation
|
page read and write
|
||
1CFC7500000
|
heap
|
page read and write
|
||
1CFE2D6B000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B32000
|
heap
|
page read and write
|
||
1CFE1B10000
|
trusted library allocation
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC9130000
|
trusted library allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFE1B23000
|
heap
|
page read and write
|
||
1CFE1B52000
|
heap
|
page read and write
|
||
1CFE1C90000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
3712000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
1CFE33F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
371E000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE5C55000
|
heap
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
25AA0D02000
|
heap
|
page read and write
|
||
1CFE1B51000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1A84000
|
trusted library allocation
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
373A000
|
heap
|
page read and write
|
||
1CFE1B22000
|
heap
|
page read and write
|
||
1CFE53B9000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
39F1000
|
trusted library allocation
|
page read and write
|
||
1CFC7654000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
7FF9A57FC000
|
trusted library allocation
|
page execute and read and write
|
||
22CD000
|
stack
|
page read and write
|
||
38D5000
|
trusted library allocation
|
page read and write
|
||
1CFE5F87000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B3F000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
B19000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFC7839000
|
trusted library allocation
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
7FF9A5856000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1CFE1A44000
|
heap
|
page read and write
|
||
1CFE1B80000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1BE0000
|
trusted library allocation
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
1CFE1D1A000
|
trusted library allocation
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
1CFC7771000
|
trusted library allocation
|
page read and write
|
||
1CFE1B32000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1C50000
|
trusted library allocation
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
1CFE6761000
|
trusted library allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
23BF000
|
stack
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE2D47000
|
heap
|
page read and write
|
||
1CFE1BB0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B36000
|
heap
|
page read and write
|
||
2EB0000
|
remote allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
A1B0CFE000
|
stack
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE3703000
|
trusted library allocation
|
page read and write
|
||
1160000
|
unkown
|
page read and write
|
||
1CFE1AA0000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1140000
|
unkown
|
page readonly
|
||
1CFE1B51000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
3956000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
1CFE1B2C000
|
heap
|
page read and write
|
||
1CFC766B000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE36E0000
|
trusted library allocation
|
page read and write
|
||
1CFE3440000
|
trusted library allocation
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1CFE1A08000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE33E0000
|
trusted library allocation
|
page read and write
|
||
1CFE1FE0000
|
trusted library allocation
|
page read and write
|
||
1CFC7860000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
23BF000
|
stack
|
page read and write
|
||
1CFE1AF0000
|
trusted library allocation
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
1CFC7510000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE1B50000
|
heap
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
A4F000
|
unkown
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B42000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
25AA084A000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B60000
|
trusted library allocation
|
page read and write
|
||
1CFC7780000
|
trusted library allocation
|
page read and write
|
||
1CFE1B5D000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFC77B0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4F000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
1CFE3714000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
1CFC77B0000
|
heap
|
page execute and read and write
|
||
1CFE3490000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE3400000
|
trusted library allocation
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
25AA0D13000
|
heap
|
page read and write
|
||
1CFE1B51000
|
heap
|
page read and write
|
||
1CFE2095000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
3713000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1CFE1B81000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
3B46000
|
trusted library allocation
|
page read and write
|
||
3B1B000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1A90000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
3952000
|
trusted library allocation
|
page read and write
|
||
7FF9A57AD000
|
trusted library allocation
|
page execute and read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B84000
|
heap
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
38A4000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B29000
|
heap
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B3F000
|
heap
|
page read and write
|
||
1CFE1B1D000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE1CF0000
|
trusted library allocation
|
page read and write
|
||
1CFC77E0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B10000
|
heap
|
page read and write
|
||
1CFE6525000
|
heap
|
page read and write
|
||
7FF9A57B0000
|
trusted library allocation
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFC77E0000
|
trusted library allocation
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
38FD000
|
trusted library allocation
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B32000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE654B000
|
heap
|
page read and write
|
||
1CFE2D80000
|
trusted library allocation
|
page read and write
|
||
1CFE1B22000
|
heap
|
page read and write
|
||
1CFC7810000
|
trusted library section
|
page readonly
|
||
1CFC9175000
|
trusted library allocation
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
384A000
|
trusted library allocation
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1A59000
|
heap
|
page read and write
|
||
1CFE2050000
|
trusted library allocation
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
2EED000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFC95EA000
|
trusted library allocation
|
page read and write
|
||
1CFE36CE000
|
trusted library allocation
|
page read and write
|
||
1CFE36AA000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
1CFC77E0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
1CFC7800000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
1CFE1B25000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B29000
|
heap
|
page read and write
|
||
1CFE1B6B000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
2FF0000
|
remote allocation
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
1150000
|
unkown
|
page readonly
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC9130000
|
trusted library allocation
|
page read and write
|
||
1CFE6451000
|
heap
|
page read and write
|
||
25AA0848000
|
heap
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B32000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFC7820000
|
heap
|
page read and write
|
||
1CFC7875000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE64B4000
|
heap
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
23C0000
|
remote allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
25AA0900000
|
trusted library allocation
|
page read and write
|
||
1CFC77A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B29000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B43000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
3AC7000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
3872000
|
trusted library allocation
|
page read and write
|
||
3956000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
1CFE19F1000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFC77E0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFC9170000
|
trusted library allocation
|
page read and write
|
||
3985000
|
trusted library allocation
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
391A000
|
trusted library allocation
|
page read and write
|
||
1CFE1BAF000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC95BB000
|
trusted library allocation
|
page read and write
|
||
1CFE5EF9000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1CFE1D80000
|
trusted library allocation
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
7FF9A57A3000
|
trusted library allocation
|
page execute and read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFE2010000
|
trusted library allocation
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
37D5000
|
trusted library allocation
|
page read and write
|
||
37AD000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1A5C000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
38C0000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B3B000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
1CFE1C0D000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1E60000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE19FF000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B23000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B00000
|
trusted library allocation
|
page read and write
|
||
1CFC7834000
|
trusted library allocation
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
3713000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC9150000
|
trusted library allocation
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1CFE1B69000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
387F000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B81000
|
heap
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
1CFE64CC000
|
heap
|
page read and write
|
||
1CFE1B50000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1A80000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1AF0000
|
trusted library allocation
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
1CFD91CD000
|
trusted library allocation
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B51000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B25000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B23000
|
heap
|
page read and write
|
||
1CFE1B6C000
|
heap
|
page read and write
|
||
1CFC91A0000
|
remote allocation
|
page read and write
|
||
1CFE1AB0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B1E000
|
heap
|
page read and write
|
||
1CFE1B38000
|
heap
|
page read and write
|
||
1CFE2000000
|
trusted library allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
7FF4BC590000
|
trusted library allocation
|
page execute and read and write
|
||
2350000
|
heap
|
page read and write
|
||
1CFC7550000
|
trusted library allocation
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1CFE1B90000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE196E000
|
unkown
|
page readonly
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE33D0000
|
trusted library allocation
|
page read and write
|
||
80D000
|
heap
|
page read and write
|
||
1CFE1B29000
|
heap
|
page read and write
|
||
25AA080D000
|
unkown
|
page read and write
|
||
1CFE2CDC000
|
heap
|
page read and write
|
||
1CFE1B20000
|
heap
|
page read and write
|
||
1CFE20D0000
|
trusted library allocation
|
page read and write
|
||
1CFE2140000
|
trusted library allocation
|
page read and write
|
||
25AA0D13000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1D30000
|
trusted library allocation
|
page read and write
|
||
1CFE1D40000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
3B63000
|
trusted library allocation
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B51000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
25AA0849000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
23FD000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
2EB0000
|
remote allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1980000
|
heap
|
page read and write
|
||
1CFE1B87000
|
heap
|
page read and write
|
||
A1B04FF000
|
stack
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B53000
|
heap
|
page read and write
|
||
1CFE1BD0000
|
trusted library allocation
|
page read and write
|
||
1CFE2CEF000
|
heap
|
page read and write
|
||
25AA06F0000
|
heap
|
page read and write
|
||
1CFE1B22000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1CFE36FC000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
3913000
|
trusted library allocation
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE1AE1000
|
trusted library allocation
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
3AEF000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE64F9000
|
heap
|
page read and write
|
||
1CFE1B4F000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC9190000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE5BF0000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
720000
|
heap
|
page read and write
|
||
1CFE34A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1EA0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
3956000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B25000
|
heap
|
page read and write
|
||
A1B02FE000
|
stack
|
page read and write
|
||
1CFE1B42000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B19000
|
heap
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
1CFE1B53000
|
heap
|
page read and write
|
||
1CFE3707000
|
trusted library allocation
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1ED0000
|
trusted library allocation
|
page read and write
|
||
1CFE1A2A000
|
heap
|
page read and write
|
||
1CFE1AD0000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
2DAD000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC9189000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B25000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
3934000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B37000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B22000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B81000
|
heap
|
page read and write
|
||
38A7000
|
trusted library allocation
|
page read and write
|
||
1CFE3A89000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
25AA0D02000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
40D000
|
unkown
|
page execute read
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
591000
|
unkown
|
page readonly
|
||
30000
|
unkown
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
386A000
|
trusted library allocation
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE2D70000
|
heap
|
page read and write
|
||
1CFE1CD0000
|
trusted library allocation
|
page read and write
|
||
2DAD000
|
stack
|
page read and write
|
||
1CFC7740000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B84000
|
heap
|
page read and write
|
||
1CFE3750000
|
trusted library allocation
|
page read and write
|
||
1CFC72F0000
|
unkown
|
page readonly
|
||
7FF9A5960000
|
trusted library allocation
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFC95F8000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE2D01000
|
heap
|
page read and write
|
||
1CFE1B3A000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B53000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1AF7000
|
heap
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B52000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE19F2000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
3711000
|
trusted library allocation
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
3937000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
234F000
|
stack
|
page read and write
|
||
25AA0D15000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B2D000
|
heap
|
page read and write
|
||
1CFE1E20000
|
trusted library allocation
|
page read and write
|
||
1CFE1B86000
|
heap
|
page read and write
|
||
D62000
|
heap
|
page read and write
|
||
1CFC91C1000
|
trusted library allocation
|
page read and write
|
||
25AA084A000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE2130000
|
trusted library allocation
|
page read and write
|
||
1CFE5C33000
|
heap
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
22F0000
|
remote allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
49D000
|
stack
|
page read and write
|
||
23FD000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
23BF000
|
stack
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1CFE6508000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1CFC9140000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
2EED000
|
stack
|
page read and write
|
||
1CFE1A52000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B50000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
230D000
|
stack
|
page read and write
|
||
1CFE1B52000
|
heap
|
page read and write
|
||
1CFE3B46000
|
trusted library allocation
|
page read and write
|
||
7FF9A57A4000
|
trusted library allocation
|
page read and write
|
||
1CFE1EB0000
|
trusted library allocation
|
page read and write
|
||
1CFE2060000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE3420000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
80D000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1CFC7651000
|
heap
|
page read and write
|
||
23BD000
|
stack
|
page read and write
|
||
1CFE1B20000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
3A73000
|
trusted library allocation
|
page read and write
|
||
1CFC7570000
|
heap
|
page read and write
|
||
1CFE1B51000
|
heap
|
page read and write
|
||
1CFC7840000
|
heap
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1B21000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B48000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1CFE36F5000
|
trusted library allocation
|
page read and write
|
||
A1B0BFE000
|
stack
|
page read and write
|
||
1CFE20F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B21000
|
heap
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE3BCB000
|
trusted library allocation
|
page read and write
|
||
1CFC7599000
|
heap
|
page read and write
|
||
23BD000
|
stack
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFE1BF0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFE1B20000
|
heap
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
1CFE2030000
|
trusted library allocation
|
page read and write
|
||
25AA0D02000
|
heap
|
page read and write
|
||
1160000
|
unkown
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
3730000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE6492000
|
heap
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1CFE2070000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
80D000
|
heap
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
25AA0D02000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
80D000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1D20000
|
trusted library allocation
|
page read and write
|
||
1CFE1A80000
|
trusted library allocation
|
page read and write
|
||
25AA0C00000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
2250000
|
remote allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1CFE1A67000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1B2D000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
25AA0C02000
|
heap
|
page read and write
|
||
7FF9A57CD000
|
trusted library allocation
|
page execute and read and write
|
||
1CFE2CAD000
|
heap
|
page read and write
|
||
1CFC7831000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1CFE36F2000
|
trusted library allocation
|
page read and write
|
||
1CFE4FB0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
1CFE370E000
|
trusted library allocation
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
1CFE2080000
|
trusted library allocation
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFE1B52000
|
heap
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFE1B81000
|
heap
|
page read and write
|
||
C11000
|
trusted library allocation
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFC9160000
|
trusted library allocation
|
page read and write
|
||
1CFE1B52000
|
heap
|
page read and write
|
||
1CFC7760000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE6517000
|
heap
|
page read and write
|
||
1CFC764D000
|
heap
|
page read and write
|
||
1CFE1B21000
|
heap
|
page read and write
|
||
391C000
|
trusted library allocation
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE1B6B000
|
heap
|
page read and write
|
||
1CFE3410000
|
trusted library allocation
|
page read and write
|
||
3950000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
1CFE1F20000
|
trusted library allocation
|
page read and write
|
||
1CFE5C30000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
3849000
|
trusted library allocation
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
23BF000
|
stack
|
page read and write
|
||
3864000
|
trusted library allocation
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
3713000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B29000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
25AA0C13000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE3450000
|
trusted library allocation
|
page read and write
|
||
2DAD000
|
stack
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE1A39000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFE64A2000
|
heap
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1CFE6561000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE5246000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B53000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1A94000
|
trusted library allocation
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFE1B35000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
23BD000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1B29000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
3D3A000
|
trusted library allocation
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1CFE3C49000
|
trusted library allocation
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
A1B05FE000
|
stack
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE6546000
|
heap
|
page read and write
|
||
1CFE3718000
|
trusted library allocation
|
page read and write
|
||
A1AFD84000
|
stack
|
page read and write
|
||
1CFC7800000
|
trusted library allocation
|
page read and write
|
||
1CFE1B81000
|
heap
|
page read and write
|
||
1CFC9190000
|
trusted library allocation
|
page read and write
|
||
1CFE33B0000
|
trusted library allocation
|
page read and write
|
||
1CFE2D3F000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
39DE000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
3876000
|
trusted library allocation
|
page read and write
|
||
1CFC7651000
|
heap
|
page read and write
|
||
31C8000
|
trusted library allocation
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
7FF9A5860000
|
trusted library allocation
|
page execute and read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B21000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
1CFE3683000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
23FD000
|
stack
|
page read and write
|
||
A1B03FD000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE2D51000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
B19000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE1B23000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1A61000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC916A000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
3924000
|
trusted library allocation
|
page read and write
|
||
1CFE68F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B3B000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE64AD000
|
heap
|
page read and write
|
||
25AA084A000
|
heap
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE3750000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC9180000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
3823000
|
trusted library allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFE1F10000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
1CFE1B69000
|
heap
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1140000
|
unkown
|
page readonly
|
||
230D000
|
stack
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B17000
|
heap
|
page read and write
|
||
1CFE66CB000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE2CF8000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
3713000
|
trusted library allocation
|
page read and write
|
||
7FF9A57C4000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
1CFC7770000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFE64C7000
|
heap
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
2D70000
|
remote allocation
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
36FF000
|
unkown
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
3956000
|
heap
|
page read and write
|
||
1CFE66C3000
|
trusted library allocation
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
1CFC7839000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFC72F2000
|
unkown
|
page readonly
|
||
1CFE1B50000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1140000
|
unkown
|
page readonly
|
||
251E000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
1CFE2D55000
|
heap
|
page read and write
|
||
1CFE36CA000
|
trusted library allocation
|
page read and write
|
||
1CFE1B48000
|
heap
|
page read and write
|
||
371C000
|
trusted library allocation
|
page read and write
|
||
1CFE370A000
|
trusted library allocation
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B43000
|
heap
|
page read and write
|
||
1CFE1B34000
|
heap
|
page read and write
|
||
3A21000
|
trusted library allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B3A000
|
heap
|
page read and write
|
||
1CFE33B0000
|
trusted library allocation
|
page read and write
|
||
1CFE1CE0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE3B3B000
|
trusted library allocation
|
page read and write
|
||
1CFC7832000
|
trusted library allocation
|
page read and write
|
||
1CFC9150000
|
trusted library allocation
|
page read and write
|
||
1CFE2090000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
7FF9A58C0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
23C0000
|
remote allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
A1B0AFE000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1FF0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
1CFE651A000
|
heap
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFE656B000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1CFE1B20000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
25AA0813000
|
unkown
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
E62917E000
|
stack
|
page read and write
|
||
1CFE1D70000
|
trusted library allocation
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFC75E5000
|
heap
|
page read and write
|
||
392A000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
230D000
|
stack
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B70000
|
heap
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1CFE1B87000
|
heap
|
page read and write
|
||
25AA0D02000
|
heap
|
page read and write
|
||
1CFE1B3C000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1CFE2045000
|
trusted library allocation
|
page read and write
|
||
1CFE1DC2000
|
trusted library allocation
|
page read and write
|
||
1CFE1B24000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
1CFE36BF000
|
trusted library allocation
|
page read and write
|
||
1CFE1B6B000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE64CF000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
1CFC7831000
|
trusted library allocation
|
page read and write
|
||
1CFE1F70000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
1CFE2D67000
|
heap
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1CFE64F0000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
230D000
|
stack
|
page read and write
|
||
1CFC74E0000
|
heap
|
page read and write
|
||
1CFC7837000
|
trusted library allocation
|
page read and write
|
||
1CFC95FC000
|
trusted library allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1A3F000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE1EE0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B20000
|
trusted library allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE6445000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFE1B29000
|
heap
|
page read and write
|
||
230D000
|
stack
|
page read and write
|
||
384D000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
3D67000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
7FF9A585C000
|
trusted library allocation
|
page execute and read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC7649000
|
heap
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
7FF9A58D0000
|
trusted library allocation
|
page execute and read and write
|
||
1CFE1B6B000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE2D36000
|
heap
|
page read and write
|
||
1CFE5C53000
|
heap
|
page read and write
|
||
1CFE1B12000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE6494000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
1CFE1B21000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE36B5000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
1CFE1B00000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B6A000
|
heap
|
page read and write
|
||
1CFE1B50000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
371C000
|
trusted library allocation
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
23BD000
|
stack
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
3892000
|
trusted library allocation
|
page read and write
|
||
25AA0848000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
3B28000
|
trusted library allocation
|
page read and write
|
||
25AA0D13000
|
heap
|
page read and write
|
||
1CFE1B42000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFC77E0000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1CFE5C3E000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B20000
|
heap
|
page read and write
|
||
7FF9A5850000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B25000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B27000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFC7832000
|
trusted library allocation
|
page read and write
|
||
371B000
|
trusted library allocation
|
page read and write
|
||
1CFE33B1000
|
trusted library allocation
|
page read and write
|
||
1CFE20E0000
|
trusted library allocation
|
page read and write
|
||
1CFE6181000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE64E8000
|
heap
|
page read and write
|
||
230D000
|
stack
|
page read and write
|
||
1CFE1B42000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B32000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE607F000
|
trusted library allocation
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
1CFE6440000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
25AA0915000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
3718000
|
trusted library allocation
|
page read and write
|
||
1CFE5DFD000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
1CFE1C40000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
1CFE1E40000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC7839000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B2D000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
1CFE1B27000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1CFE1B36000
|
heap
|
page read and write
|
||
1CFC7860000
|
trusted library allocation
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1EF0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
1CFE64D3000
|
heap
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
1CFE1D60000
|
trusted library allocation
|
page read and write
|
||
1CFC7589000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE64A8000
|
heap
|
page read and write
|
||
1CFC91A0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B21000
|
heap
|
page read and write
|
||
1CFC762E000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC75DC000
|
heap
|
page read and write
|
||
25AA0848000
|
unkown
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1B20000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1CFE5BFC000
|
heap
|
page read and write
|
||
25AA0800000
|
unkown
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1CFE6569000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFC9140000
|
trusted library allocation
|
page read and write
|
||
1CFE5E18000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1E30000
|
trusted library allocation
|
page read and write
|
||
230D000
|
stack
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
1CFC9160000
|
trusted library allocation
|
page read and write
|
||
1CFE1B42000
|
heap
|
page read and write
|
||
1CFE3430000
|
trusted library allocation
|
page read and write
|
||
1CFE1B20000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE1B42000
|
heap
|
page read and write
|
||
1CFE2D1C000
|
heap
|
page read and write
|
||
1CFC7654000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1CFE6455000
|
heap
|
page read and write
|
||
1CFE1F30000
|
trusted library allocation
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
230D000
|
stack
|
page read and write
|
||
1CFE2CD1000
|
heap
|
page read and write
|
||
1CFE1B2E000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1CFE5BF1000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B65000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
3718000
|
trusted library allocation
|
page read and write
|
||
1CFE33F0000
|
trusted library allocation
|
page read and write
|
||
1CFD91C1000
|
trusted library allocation
|
page read and write
|
||
1CFC7505000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE3750000
|
trusted library allocation
|
page read and write
|
||
1CFE1AF7000
|
trusted library allocation
|
page read and write
|
||
1CFE36B0000
|
trusted library allocation
|
page read and write
|
||
1CFC9170000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
37F1000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1CFE1B2B000
|
heap
|
page read and write
|
||
1CFE1B53000
|
heap
|
page read and write
|
||
1CFE1B29000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1DF0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
23C0000
|
remote allocation
|
page read and write
|
||
1CFE1B20000
|
heap
|
page read and write
|
||
1CFE19A2000
|
heap
|
page read and write
|
||
25AA084A000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B38000
|
heap
|
page read and write
|
||
1CFE3D52000
|
trusted library allocation
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
1CFE1B2B000
|
heap
|
page read and write
|
||
326E000
|
unkown
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B27000
|
heap
|
page read and write
|
||
1CFE1E90000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1CFE19AA000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B81000
|
heap
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
113D000
|
stack
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFC783D000
|
trusted library allocation
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1CFC7850000
|
trusted library allocation
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1AB0000
|
trusted library section
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
80D000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B52000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
1CFE1B4C000
|
heap
|
page read and write
|
||
23BD000
|
stack
|
page read and write
|
||
1CFE1B23000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1CFC75DA000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
230D000
|
stack
|
page read and write
|
||
1CFE198C000
|
heap
|
page read and write
|
||
22F0000
|
remote allocation
|
page read and write
|
||
1CFE1F80000
|
trusted library allocation
|
page read and write
|
||
2250000
|
remote allocation
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
1CFE1B68000
|
heap
|
page read and write
|
||
E629279000
|
stack
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B18000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFC7810000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1E70000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page execute and read and write
|
||
1CFC75AC000
|
heap
|
page read and write
|
||
1CFE5F8B000
|
heap
|
page read and write
|
||
1CFE651C000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B10000
|
trusted library allocation
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE1BC0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
23FD000
|
stack
|
page read and write
|
||
1CFE5DFA000
|
heap
|
page read and write
|
||
3716000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
7FF9A5886000
|
trusted library allocation
|
page execute and read and write
|
||
3A40000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
remote allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE2CAA000
|
heap
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
1CFE1A47000
|
heap
|
page read and write
|
||
1CFE5BF1000
|
heap
|
page read and write
|
||
1CFE1B4F000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE19BC000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1CFE1B21000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE2100000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE5303000
|
trusted library allocation
|
page read and write
|
||
1CFE1CB0000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
7FF9A57BD000
|
trusted library allocation
|
page execute and read and write
|
||
1CFE63E2000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFE1DD0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B26000
|
heap
|
page read and write
|
||
1CFE1B67000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
1CFC7450000
|
heap
|
page read and write
|
||
1CFE3D40000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFC765F000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
25AA0D00000
|
heap
|
page read and write
|
||
1CFE1B52000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
591000
|
unkown
|
page readonly
|
||
C11000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFE20C0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
23C0000
|
remote allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC757C000
|
heap
|
page read and write
|
||
80D000
|
heap
|
page read and write
|
||
1CFE1FD0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B15000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE5773000
|
trusted library allocation
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1CFE1B6D000
|
heap
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
||
1CFE1B36000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
23BD000
|
stack
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
1CFE56B6000
|
trusted library allocation
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1CFE3A40000
|
trusted library allocation
|
page read and write
|
||
1CFE650A000
|
heap
|
page read and write
|
||
25AA0760000
|
heap
|
page read and write
|
||
1CFE1F60000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
234D000
|
stack
|
page read and write
|
||
1CFE1B29000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
1CFE1B4C000
|
heap
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1CFE1B22000
|
heap
|
page read and write
|
||
1CFE1AD0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE2D2B000
|
heap
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFC95CE000
|
trusted library allocation
|
page read and write
|
||
1CFE1DE0000
|
trusted library allocation
|
page read and write
|
||
1CFE1B66000
|
heap
|
page read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
1CFE2D4C000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CFE1D48000
|
trusted library allocation
|
page read and write
|
||
25AA0D02000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
1CFE1C10000
|
trusted library allocation
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1CFC7665000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
1CFE1B20000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
1CFE1AE0000
|
trusted library allocation
|
page read and write
|
||
1CFE6536000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4D000
|
heap
|
page read and write
|
||
22CD000
|
stack
|
page read and write
|
||
7FF9A5980000
|
trusted library allocation
|
page execute and read and write
|
||
1CFE1B64000
|
heap
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFE1B30000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
1CFE1B51000
|
heap
|
page read and write
|
||
1CFE1982000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
230D000
|
stack
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1CFC7830000
|
trusted library allocation
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
1CFC7442000
|
unkown
|
page readonly
|
||
1CFE5EFC000
|
trusted library allocation
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
1CFE1E80000
|
trusted library allocation
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE2C80000
|
heap
|
page read and write
|
||
1CFE1A1D000
|
heap
|
page read and write
|
||
1CFE1B4A000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
1CFE1B63000
|
heap
|
page read and write
|
||
1CFE2D0A000
|
heap
|
page read and write
|
||
1CFE1B4B000
|
heap
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
1CFE1B28000
|
heap
|
page read and write
|
||
25AA0D13000
|
heap
|
page read and write
|
||
25AA0902000
|
trusted library allocation
|
page read and write
|
||
1CFE1B2F000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE2DA2000
|
trusted library allocation
|
page read and write
|
||
25AA0849000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B22000
|
heap
|
page read and write
|
||
1CFE1B2A000
|
heap
|
page read and write
|
||
2D70000
|
remote allocation
|
page read and write
|
||
1CFE5C04000
|
heap
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
1CFE1B4E000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1CFE1B39000
|
heap
|
page read and write
|
There are 2193 hidden memdumps, click here to show them.